You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/how-to-guide-deploy-a-private-mobile-network-azure-portal.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Deploy a private mobile network - Azure portal
3
3
titleSuffix: Azure Private 5G Core
4
-
description: This how-to guide shows how to deploy a private mobile network through Azure Private 5G Core using the Azure portal
4
+
description: This how-to guide shows how to deploy a private mobile network through Azure Private 5G Core using the Azure portal.
5
5
author: robswain
6
6
ms.author: robswain
7
7
ms.service: private-5g-core
@@ -36,7 +36,7 @@ In this step, you'll create the Mobile Network resource representing your privat
36
36
37
37
:::image type="content" source="media/create-button-mobile-networks.png" alt-text="Screenshot of the Azure portal showing the Create button on the Mobile Networks page.":::
38
38
39
-
1. Use the information you collected in [Collect private mobile network resource values](collect-required-information-for-private-mobile-network.md#collect-mobile-network-resource-values) to fill out the fields on the **Basics** configuration tab. Once you've done this, select **Next : SIMs >**.
39
+
1. Use the information you collected in [Collect private mobile network resource values](collect-required-information-for-private-mobile-network.md#collect-mobile-network-resource-values) to fill out the fields on the **Basics** configuration tab, then select **Next : SIMs >**.
40
40
41
41
:::image type="content" source="media/how-to-guide-deploy-a-private-mobile-network-azure-portal/create-private-mobile-network-basics-tab.png" alt-text="Screenshot of the Azure portal showing the Basics configuration tab.":::
42
42
@@ -58,14 +58,14 @@ In this step, you'll create the Mobile Network resource representing your privat
58
58
1. If you're provisioning SIMs at this point, you'll need to take the following additional steps.
59
59
1. If you want to use the default service and allow-all SIM policy, set **Do you wish to create a basic, allow-all SIM policy and assign it to these SIMs?** to **Yes**, and then enter the name of the data network into the **Data network name** field that appears.
60
60
1. Under **Enter SIM group information**, set **SIM group name** to your chosen name for the SIM group to which your SIMs will be added.
61
-
1. Under **Enter encryption details for SIM group**, set **Encryption type** to your chosen encryption type. Once the SIM group is created, you cannot change the encryption type.
61
+
1. Under **Enter encryption details for SIM group**, set **Encryption type** to your chosen encryption type. Once the SIM group is created, you can't change the encryption type.
62
62
1. If you selected **Customer-managed keys (CMK)**, set the **Key URI** and **User-assigned identity** to those the SIM group will use for encryption.
63
63
1. Select **Review + create**.
64
64
1. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
65
65
66
66
:::image type="content" source="media/how-to-guide-deploy-a-private-mobile-network-azure-portal/create-private-mobile-network-review-create-tab.png" alt-text="Screenshot of the Azure portal showing validated configuration for a private mobile network.":::
67
67
68
-
If the validation fails, you'll see an error message and the configuration tab(s) containing the invalid configuration will be flagged with red dots. Select the flagged tab(s) and use the error messages to correct invalid configuration before returning to the **Review + create** tab.
68
+
If the validation fails, you'll see an error message, and the configuration tab or tabs containing the invalid configuration will be flagged with red dots. Select the flagged tabs and use the error messages to correct invalid configuration before returning to the **Review + create** tab.
69
69
70
70
1. Once the configuration has been validated, select **Create** to create the Mobile Network, slice, and any SIM resources.
71
71
1. The Azure portal will now deploy the resources into your chosen resource group. You'll see the following confirmation screen when your deployment is complete.
@@ -91,13 +91,13 @@ You can change the public land mobile network (PLMN) identifier, comprising a Mo
91
91
92
92
1. Update the MCC and/or MNC as required.
93
93
1. Select **Modify**.
94
-
1.[Reinstall the packet core](reinstall-packet-core.md) to apply the change. If you have multiple packet cores in this mobile network, you will need to reinstall all of them.
94
+
1.[Reinstall the packet core](reinstall-packet-core.md) to apply the change. If you have multiple packet cores in this mobile network, you'll need to reinstall all of them.
95
95
96
96
## Next steps
97
97
98
98
You can begin designing policy control to determine how your private mobile network will handle traffic, create more network slices, enable SUPI concealment, or start adding sites to your private mobile network.
99
99
100
100
-[Learn more about designing the policy control configuration for your private mobile network](policy-control.md)
101
101
-[Create and manage network slices](create-manage-network-slices.md)
Copy file name to clipboardExpand all lines: articles/private-5g-core/private-5g-core-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,7 +186,7 @@ For more information on using Azure Monitor to analyze metrics in your deploymen
186
186
187
187
Azure Private 5G Core can be configured to integrate with Azure Monitor Event Hubs, allowing you to monitor UE usage.
188
188
189
-
For more information on using Event Hubs to monitor UE usage in your deployment, see [Monitor UE usage via Azure Event Hubs (preview)](ue-usage-event-hub.md).
189
+
For more information on using Event Hubs to monitor UE usage in your deployment, see [Monitor UE usage via Azure Event Hubs](ue-usage-event-hub.md).
Copy file name to clipboardExpand all lines: articles/private-5g-core/supi-concealment.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Enable SUPI concealment (preview)
2
+
title: Enable SUPI concealment
3
3
titleSuffix: Azure Private 5G Core
4
4
description: In this how-to guide, learn how to configure SUPI concealment.
5
5
author: robswain
@@ -10,7 +10,7 @@ ms.date: 02/01/2024
10
10
ms.custom: template-how-to
11
11
---
12
12
13
-
# Enable SUPI concealment (preview)
13
+
# Enable SUPI concealment
14
14
15
15
The **subscription permanent identifier (SUPI)** is a unique, permanent identifier for a device. To avoid transmitting this identifier in plain text, it can be concealed through encryption. The encrypted value is known as the **subscription concealed identifier (SUCI)**. The encryption (SUPI concealment) is performed by the UE on registration, generating a new SUCI each time to prevent the user from being tracked. Decryption (SUCI deconcealment) is performed by the Unified Data Management (UDM) network function in the packet core.
Copy file name to clipboardExpand all lines: articles/private-5g-core/whats-new.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,17 @@ To help you stay up to date with the latest developments, this article covers:
22
22
23
23
This page is updated regularly with the latest developments in Azure Private 5G Core.
24
24
25
+
## March 2024
26
+
### SUPI concealment
27
+
28
+
**Type:** New feature
29
+
30
+
**Date available:** March 22, 2024
31
+
32
+
The SUPI (subscription permanent identifier) secret needs to be encrypted before being transmitted over the radio network as a SUCI (subscription concealed identifier). The concealment is performed by the UEs on registration, and deconcealment is performed by the packet core. You can now securely manage the required private keys through the Azure Portal and provision SIMs with public keys.
33
+
34
+
For more information, see [Enable SUPI concealment](supi-concealment.md).
35
+
25
36
## February 2024
26
37
### New Entra ID user role needed for distributed tracing tool
0 commit comments